Suggested Topics within your search.
Suggested Topics within your search.
- Computer programs 11
- Business 8
- BASIC (Computer program language) 2
- Computer simulation 2
- Data processing 2
- Design 2
- Design and construction 2
- Digital techniques 2
- Java (Computer program language) 2
- Web sites 2
- Agriculture 1
- Bioinformatics 1
- Business intelligence 1
- C++ (Computer program language) 1
- COBOL (Computer program language) 1
- COMPUTERS / Desktop Applications / Suites 1
- COMPUTERS / Internet / General 1
- Cascading style sheets 1
- Cloud computing 1
- Coding and Information Theory 1
- Coding theory 1
- Communication policy 1
- Computer programming 1
- Computer scheduling 1
- Computer-aided design 1
- Digitale Photographie 1
- Electric machinery 1
- Electric power systems 1
- Electronic spreadsheets 1
- General 1
-
1641
-
1642
Methods for Cognitive Diagnosis of Students’ Abilities Based on Keystroke Features
Published 2025-04-01“…We have independently constructed a keystroke dataset for computer-based programming examinations and used it to verify our method. …”
Get full text
Article -
1643
Метод оценки частоты выполнения фрагментов кода последовательной программы
Published 2010-06-01“…The goal of this article is to consider the task of determining the execution frequency of program basic blocks. This task is important for such applications as program optimization, paralleling program execution, computing resources allocation, program compaction, and malicious software detection. …”
Get full text
Article -
1644
Development of an Innovative Telerehabilitation System to Improve Handgrip Strength
Published 2022-12-01Get full text
Article -
1645
Modeling Economy of Information Security of Business Entity Based on Simplex-Method
Published 2021-02-01“…To resolve these tasks different mathematic models can be used, such as methods of linear programming. Linear programming is a mathematic subject dealing with theory and methods of resolving extreme tasks on sets of n-dimensional space given by systems of linear equations and inequalities. …”
Get full text
Article -
1646
Alternative Trajectories for the Optimization of Trochoidal Milling in Hardened Steel
Published 2025-05-01“…Three toolpaths—conventional, horizontal semi-ellipse, and vertical semi-ellipse—were analyzed in terms of machining time and machining forces under dry and flood coolant conditions. Computer Numerical Control (CNC) programs were optimized using circular interpolation and repetition commands to minimize number of command blocks and maintain effective feed rates. …”
Get full text
Article -
1647
-
1648
-
1649
Ensuring accuracy of contour milling on CNC machines
Published 2023-04-01“…A computer program was created, the core of which is a mathematical model of the process, which reproduces the structural diagram of the machining system closed behind two elastic deflections. …”
Get full text
Article -
1650
Segmentation of the Sensor Data Stream in Pervasive Smart Environments
Published 2020-09-01Get full text
Article -
1651
-
1652
Teaching Data Analysis and Machine Learning at University: Generalization of Experience and Perspectives
Published 2024-03-01“…However, familiarity with the tasks that arise in data analysis leads to the idea that this section of computer science can be especially useful for students of natural sciences, medical fields of training, as well as sociologists, historians, psychologists, etc. …”
Get full text
Article -
1653
Integrated Operational Planning of Battery Storage Systems for Improved Efficiency in Residential Community Energy Management Using Multistage Stochastic Dual Dynamic Programming:...
Published 2025-07-01“…Using stylized test data, we evaluate battery storage optimization strategies by comparing various SDDP model configurations against a linear programming (LP) benchmark model. The SDDP optimization framework demonstrates robust performance in battery operation management, efficiently handling diverse pricing scenarios while maintaining computational efficiency. …”
Get full text
Article -
1654
LEGAL LABYRINTH OF CYBERSPACE – A MAP FOR THE RESPONSIBLE USER
Published 2024-12-01“…Attacks using it are directed, among others, at systems, data and computer programs, user privacy and intellectual property. …”
Get full text
Article -
1655
Cost-sharing in Parking Games
Published 2024-11-01“…Our main contribution is a polynomial-time algorithm to compute the Shapley value of parking games, in contrast with known hardness results on computing the Shapley value of arbitrary games. …”
Get full text
Article -
1656
A comprehensive survey of scoring functions for protein docking models
Published 2025-01-01Get full text
Article -
1657
-
1658
Predicting the Damage of Urban Fires with Grammatical Evolution
Published 2025-05-01Get full text
Article -
1659
-
1660